By Topic

2009 First International Conference on Emerging Network Intelligence

11-16 Oct. 2009

Filter Results

Displaying Results 1 - 25 of 31
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (315 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (87 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2009, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Building Knowledge Lifecycle and Situation Awareness in Self-Managed Cognitive Future Internet Networks

    Publication Year: 2009, Page(s):3 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    This paper describes aspects for developing cognitive functionalities in self-managed networks according to the vision of the future Internet networks being developed in the Self-NET project. The project develops and prototypes architecture and solutions for realising a vision on Internet evolution based on integration of cognition and autonomics in self-managed networks demonstrated in numerous a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximate Frequency Counts Algorithm for Network Monitoring and Analysis: Improvement of "Lossy Counting"

    Publication Year: 2009, Page(s):9 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    Monitoring network traffic is important to analyze network state, so that it is necessary to observe various traffic data and then compute the data frequency counts. If we process all the incoming packets, a lot of computer resources (mainly memory and CPU) are needed. Stream mining based algorithms can approximately compute data frequency counts over data streams with small resources. Lossy count... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Coding for Efficient Error Recovery in Wireless Sensor Networks for Medical Applications

    Publication Year: 2009, Page(s):15 - 20
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    Modern medical wireless systems present a challenge where communication reliability is crucial, but the resources are limited, since medical devices carried on a patient need to be small. We propose, simulate and analyze one relay network, and show that network coding along with redundancy can be used as a very efficient error recovery mechanism that greatly improves network reliability at very lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource Discovery Approach to Support a QoS-aware DHT-Based Caching Architecture

    Publication Year: 2009, Page(s):21 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Though widely accepted as a key building block for next-generation large scale decentralized systems, the lack of flexibility of DHTs on efficient non identifier-based lookups is a well-known problem. In this paper, a resource discovery service that tackles the issues identified in a decentralized and distributed DHT-based caching architecture for media content distribution is presented. In the pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-Based Approach to Measuring Quality of Experience

    Publication Year: 2009, Page(s):29 - 32
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Quantifiable quality measures are necessary for VoIP service providers in order to offer services and be sure to keep users for their services. Existing methods used for evaluating the Quality of Experience (QoE) mostly rely on user survey and scores from the user, which are too subjective and need much processing time and cost. This paper proposes a pentagram model for measuring QoE. The model co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomic Re-configuration of Pervasive Supervision Services

    Publication Year: 2009, Page(s):33 - 38
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2256 KB) | HTML iconHTML

    This paper describes a supervision system for autonomic distributed systems (e.g., a cloud computing environment). It is designed as a supplementary service and is structured as an ensemble of components that implement an autonomic control loop, which does not require any a priori knowledge on the structure of the supervised system. The architecture devised is highly modular and can be configured ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emerging Urban Applications of Broadband Optical Wireless Networking

    Publication Year: 2009, Page(s):39 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    Optical wireless technology offers a unique solution to a variety of communications needs. It provides a balanced option between the convenience of traditional radio frequency and the communication capacity of wired media. This offers novel solutions to existing and new communication challenges. Such uniqueness comes at a price, however, as the deployment of optical wireless is not straightforward... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Physical Layer Security with Yarg Code

    Publication Year: 2009, Page(s):43 - 48
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    We introduce Yarg code, a binary numeral system for QAM symbol mapping designed to yield improved physical layer security. The simulation results show that Yarg code reduces the security gap from 17.33 dB to 9.42 dB for 16 QAM, and from 17.7 dB to 7.18 dB for 64 QAM with respect to the Gray code. The improved security properties come at the cost of increased required SNR by 6~9 dB. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FEC-Integrated Network Traffic Shaping Using the NIProxy

    Publication Year: 2009, Page(s):51 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    Optimizing the satisfaction of users of distributed applications is an important yet non-trivial task. Data corruption incurred during network transmission plays a significant role in this context since it is likely to result in user frustration. As a countermeasure, Forward Error Correction (FEC) schemes complement source data with redundant information to enable data recovery at destination-side... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Organization Based Network Architecture for New Generation Networks

    Publication Year: 2009, Page(s):61 - 68
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1695 KB) | HTML iconHTML

    An emerging new generation network is requested to accommodate a enormous numbers of nodes with high diversity and a wide variety of traffic and applications. To achieve higher scalability, adaptability, and robustness than ever before, in this paper we present new network architecture composed of self-organizing entities. The architecture consists of the physical network layer, service overlay ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-wavelength Optical Switch Fabric for Next-Generation Optical Switches

    Publication Year: 2009, Page(s):69 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Next-generation switches and routers in optical networks will rely on optical switch fabrics (OSFs) to overcome the problem of the unnecessary optical-electrical-optical conversions and signal processing. In this paper, we propose a new architecture of an OSF based on tunable fiber Bragg gratings (FBGs). The main feature of the architecture is its ability to be used for both packet and circuit swi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Key Management for Router Updates

    Publication Year: 2009, Page(s):77 - 81
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    Security is assuming increasing importance in emerging networks. To ensure application security, the routing protocols are assumed to be trusted. Correct forwarding of packets requires the prior exchange of information among routers, using the appropriate routing protocol. Valid construction of the routes requires that the exchanged information be received from a legitimate neighbor, and that it n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Models for Pheromone Evaluation in Ant Systems for Mobile Ad-hoc Networks

    Publication Year: 2009, Page(s):85 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    On a mobile ad-hoc network environment, where the resources are scarce, the knowledge about the network's link state is essential to optimize the routing procedures. This paper presents a study about different pheromone evaluation models and how they react to possible changes in traffic rate. Observing how the pheromone value on a link changes, it could be possible to identify certain patterns whi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy Based Flow Management with the Host Identity Protocol for Multihomed Hosts

    Publication Year: 2009, Page(s):91 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    In this paper, we introduce a policy based flow management system for multihomed hosts using the Host Identity Protocol. A simple language is provided to specify policies that influence the source and destination IP addresses of outgoing packets. The language is flexible and extensible enough to express policies for selecting IP addresses based on bandwidth, cost and other access network character... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Quality Degradation Detection Method by Using Network Specification

    Publication Year: 2009, Page(s):97 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (613 KB) | HTML iconHTML

    The authors propose a framework and a detection method for network quality degradation. The framework has three functions. The first function is making a topology tree and selecting flows by watching network traffic at a single point probe. The second function is inferring a network specification, whether a flow has wireless link or not, by frequency analysis. The third function is the network qua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet Delay Analysis for Priority-Based Passive Optical Networks

    Publication Year: 2009, Page(s):103 - 107
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Passive optical network (PON) systems are rapidly becoming the most promising and cost-effective class of fiber access systems. In this paper we investigate the performance of a simple PON configuration, in respect of the end-to-end packet delay. The network supports multiple service-classes with priorities, in terms of the number of packets that can be transmitted in each transmission period. We ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging Risk Based Testing in Enterprise Systems Security Validation

    Publication Year: 2009, Page(s):111 - 116
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    As the security breaches continue to grow, and as project teams become larger and more distributed the cost of testing the security of the software systems will increase rapidly. Companies that take the time to test the security of their software systems before releasing it to production are at a disadvantage because of higher costs and potential late arrival to the market. On the other side of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.